In this week's Security Advisory:
HubSpot, a provider that offers marketing and customer service software solutions, has issued a security notice confirming that threat actors were able to gain access on a limited number of HubSpot customer accounts on June 22nd, 2024. HubSpot notes that the accounts were targeted directly and not through HubSpot itself. They have already contacted all known victim accounts.
Our Threat Intelligence team will continue to disseminate updated information as it becomes available and as is deemed pertinent and actionable.
More Reading/Information
Cisco has released an update for NX-OS, the operating system used in Cisco Nexus-series switches, to address a severe vulnerability. The flaw, identified as CVE-2024-20399 and rated 6.0 out of 10 on the CVSS scale, could allow an authenticated local attacker to execute arbitrary commands with root-level privileges. Exploiting this vulnerability requires the attacker to have both network access and administrator credentials. Recent reports indicate threat actors are exploiting this vulnerability in the wild.
Affected Devices:
More Reading/Information
Fortra has issued a patch to address a critical vulnerability in FileCatalyst Workflow, a secure file transfer tool. Tracked as CVE-2024-5276, this vulnerability involves a SQL injection flaw that allows attackers to execute arbitrary commands. Successful exploitation could grant unauthorized access to sensitive information and allow attackers to create administrative user accounts for persistence. CVE-2024-5276 has been rated 9.8 out of 10 on the CVSS severity scale.
Affected Versions
More Reading/Information
GitLab has issued security updates to resolve fourteen (14) vulnerabilities in both its Community and Enterprise Editions. Among these, the most critical is CVE-2024-5655, which has a CVSS score of 9.6 out of 10. This vulnerability can allow an attacker to execute the continuous integration and continuous deployment (CI/CD) pipeline with any user credential. If exploited successfully, this flaw could allow threat actors to perform unauthorized actions and gain access to sensitive data.
More Reading/InformationAndroid released updates to address twenty-five (25) vulnerabilities, with one (1) given a severity rating of "Critical." The most severe of these vulnerabilities is being tracked as CVE-2024-31320 and could lead to local privilege escalation. These vulnerabilities affect Android OS security patch levels prior to 2024-07-05.
More Reading/Information
Please review your environment to ensure the above-mentioned issues are patched in a timely manner. It is security best practice to regularly update and/or patch software to the latest versions. The vulnerabilities above highlight the security benefits of limiting deployed software to "vendor-supported versions" only. This dramatically increases the likelihood that new vulnerabilities have a patch issued for them. Likewise, Cybersafe strongly encourages maintaining an inventory of current software in your environment, which helps ensure and inform your patch and vulnerability management program.